BANNER SC26-2 Safety Controllers Secure Deployment User Guide
- June 16, 2024
- BANNER
Table of Contents
- About this Guide
- Introduction
- What is Security?
- I have a Firewall. Isn’t that Enough?
- What is Defense in Depth?
- General Recommendations
- Checklist
- Communication Requirements
- Supported Protocols
- USB Protocols
- XS/SC26-2 Application Protocol
- XS/SC26-2 Discovery Protocol
- Ethernet Servers
- Ethernet Firewall Configuration
- Lower-Level Protocols
- Application Layer Protocols
- Security Capabilities
- Capabilities by Product
- Access Control and Authorization
- Authorization Framework
- Specifying Access Rights
- Enforcement
- Password/PIN Management
- Communication Protocols
- Logging and Auditing
- Configuration Hardening
- Safety Controller
- USB Port, Onboard Interface, and Physical Access
- Ethernet Interface
- Network Architecture and Secure Deployment
- Reference Architecture
- Remote Access and Demilitarized Zones (DMZ)
- Access to Process Control Networks
- Other Considerations
- Configuration Management
- Real-time Communication
- Additional Guidance
- Contact Us
- Read User Manual Online (PDF format)
- Download This Manual (PDF format)
BANNER SC26-2 Safety Controllers Secure Deployment User Guide
About this Guide
This document provides information to help improve the cyber security of systems that include XS/SC26-2 Safety Controllers. It is intended for use by control engineers, integrators, IT professionals, and developers responsible for deploying and configuring XS/SC26-2 Safety Controllers.
Introduction
This section introduces the fundamentals of security and secure deployment.
What is Security?
Security is the process of maintaining the confidentiality, integrity, and availability of a system
- Confidentiality: Ensure only the people you want to see information can see it
- Integrity: Ensure the data is what it is supposed to be
- Availability: Ensure the system or data is available for use
Banner recognizes the importance of building and deploying products with these
concepts in mind and encourages
customers to take the appropriate care in securing their Banner Safety
products and solutions.
NOTE: As Banner Safety product vulnerabilities are discovered and fixed, security advisories are issued to describe each vulnerability in a particular product version, as well as the version in which the vulnerability was fixed. Banner Safety product security advisories are available at: bannerengineering.com/support/tech- help/PSIRT.
I have a Firewall. Isn’t that Enough?
Firewalls and other network security products, including data diodes and Intrusion Prevention Systems (IPS), can be an important component of any security strategy. However, a strategy based solely on any single security mechanism is not as resilient as one that includes multiple, independent layers of security.
Therefore, Banner Safety recommends taking a “Defense in Depth” approach to security.
What is Defense in Depth?
Defense in depth is the concept of using multiple, independent layers of security to raise the cost and complexity of a successful attack. To carry out a successful attack on a system, an attacker would need to find not just a single exploitable vulnerability but would need to exploit vulnerabilities in each layer of defense that protects an asset.
For example, if a system is protected because it is on a network protected by a firewall, the attacker only needs to circumvent the firewall to gain unauthorized access. However, if there is an additional layer of defense, such as a username/password authentication requirement, the attacker needs to find a way to circumvent both the firewall and the username/password authentication.
General Recommendations
Use the following security practices when using Banner Safety products and solutions.
- The safety controllers covered in this document were not designed for or intended to be connected directly to any wide area network, including, but not limited to, a corporate network or the internet at large. Additional routers and firewalls (such as those illustrated in “ Reference Architecture” on page 18) that have been configured with access rules customized to the site’s specific needs must be used to access devices described in this document from outside the local control networks. If a control system requires external connectivity, take care to control, limit, and monitor all access, using, for example, virtual private networks (VPN) or Demilitarized Zone (DMZ) architectures.
- Harden system configurations by enabling/using the available security features, and by disabling unnecessary ports, services, functionality, and network file shares.
- Apply all the latest Banner Safety product security updates, Security Information Management (SIM), and other recommendations.
- Apply all the latest operating system security patches to control systems PCs.
- Use anti-virus software on control systems PCs and keep the associated anti-virus signatures up-to-date.
- Use whitelisting software on control systems PCs and keep the w
- hitelist up-to-date.
Checklist
This section provides a sample checklist to help guide the process of securely deploying XS/SC26-2 Safety Controllers.
-
Create or locate a network diagram.
-
Identify and record the required communication paths between nodes.
-
Identify and record the protocols required along each path, including the role of each node. (See “Communication Requirements” on page 7.)
-
Revise the network as needed to ensure appropriate partitioning, adding firewalls, or other network security devices as appropriate. Update the network diagram. (See “Network Architecture and Secure Deployment” on page 18.)
-
Configure firewalls and other network security devices. (See “Ethernet Firewall Configuration” on page 9 and “Network Architecture and Secure Deployment” on page 18.)
-
Enable and/or configure the appropriate security features on each XS/SC26-2 Safety Controller. (See “Security
Capabilities” on page 11.) -
On each XS/SC26-2 safety controller, set every supported password to a strong value. (See “Password/PIN
Management” on page 13.) -
Harden the configuration of each XS/SC26-2 safety controller, disabling unneeded features, protocols, and ports.
(See “Configuration Hardening” on page 15.) -
Test / qualify the system.
-
Create an update/maintenance plan.
NOTE : Secure deployment is only one part of a robust security program. This document, including this checklist, is limited to providing secure deployment guidance only. For more information about security programs in general, see “ Additional Guidance” on page 21.
Communication Requirements
Communication between different parts of a control system is, and must be, supported. However, the security of a control system can be enhanced by limiting the protocols allowed, and the paths across which they are allowed, to only what is needed.
This can be accomplished by disabling every communication protocol that isn’t needed on a particular device, and by using appropriately configured and deployed network security devices (for example, firewalls and routers) to block every protocol (whether disabled or not) that doesn’t need to pass from one network/segment to another.
Banner Safety recommends limiting the protocols allowed by the network infrastructure to the minimum set required for the intended application. Successfully doing this requires knowing which protocol is needed for each system-level interaction.
This section describes how the supported serial and Ethernet application protocols are used by Banner Safety Controllers and indicates the role of each participant in the communication. Lower-level Ethernet protocols are not discussed here but are instead assumed to be supported when needed by the application protocol.
Use this information is intended to guide the specification of the network architecture and to help configure firewalls internal to that network, to support only the required communications paths for any particular installation.
Supported Protocols
Ethernet Protocols
The following table indicates which Ethernet protocols are supported Banner
XS/SC26-2 Safety Controllers. Note that some of the supported protocols may
not be required in a given system, because the installation may only be using
a subset of the available protocols.
Table 1. Supported Ethernet Protocols
| Protocol| XS/SC26-2
---|---|---
Link| ARP| x
Internet| IPv4| x
IGMP| x
ICMP| x
Transport| TCP| x
UDP| x
Application| Modbus TCP®(1)| x
Ethernet/IP™(2)| x
- Modbus® is a registered trademark of Schneider Electric USA, Inc.
- EtherNet/IP™ is a trademark of ODVA, Inc.
Continued from page 7
| Protocol| XS/SC26-2
---|---|---
| PROFINET®(1)| x
TLS 1.2| x
USB Protocols
In addition to Ethernet communication, XS/SC26-2 Safety Controllers support
communication over a direct USB connection.
Table 2. Supported USB Protocols
| Protocol| XS/SC26-2
---|---|---
Application| USB Communications Device Class (CDC) with Application-Specific
Driver| x
XS/SC26-2 Application Protocol
The XS/SC26-2 Application protocol is a proprietary protocol that provides
access to services supported by the XS/
SC26-2 Safety Controllers. This is the only protocol used by the Banner Safety
Controller Software when communicating with an XS/SC26-2 Safety Controller.
XS/SC26-2 Application protocol supports many different operations, including the following:
- Upload / download a confirmed configuration
- Confirm a new configuration
- Reset the safety controller to factory defaults
- Enable and configure network interface
- Monitor the live application
- Configure the safety controller user access and passwords
- View and clear (optional) a log of any faults that have occurred in the controller
- Reset the safety controller to factory defaults
- View the Configuration log
The XS/SC26-2 Application Protocol is transported over a direct USB 2.0 CDC connection using a standard USB 2.0- compliant cable or over an Ethernet TLS 1.2 connection.
XS/SC26-2 Discovery Protocol
The XS/SC26-2 Discovery protocol is a proprietary protocol that allows the Banner Safety Controller Software to locate XS/ SC26-2 Safety Controllers on the Local Area Network within a Security Zone. XS/SC26-2 Discovery Protocol is based on UDP Broadcasts. Because the Discovery Protocol is based on UDP broadcasts, it will not be available outside of a Security Zone or a LAN to which the Controller is connected. Discovery protocol is also not available across VLANs.
Ethernet Servers
This section summarizes the available Ethernet communication-centric
functionality, where the communication is initiated by some other device or
PC.
Table 3. XS/SC26-2 Server Capabilities
| Functionality| Required Application Protocols| Example Clients
---|---|---|---
Ethernet| PROFINET| PROFINET| Other controllers
Continued from page 8
| Functionality| Required Application Protocols| Example Clients
---|---|---|---
| Modbus TCP Server| Modbus TCP| Other controllers
Ethernet/IP| Ethernet/IP| Other controllers
Live Mode and Remote Configuration Server| XS/SC26-2 Application Protocol|
Banner Safety Controller Software(PCI)
Discovery Server| XS/SC26-2 Discovery Protocol| Banner Safety Controller
Software(PCI)
Ethernet Firewall Configuration
Configure network-based and host-based firewalls to allow only expected and required network traffic.
This section identifies the EtherTypes and the TCP/UDP ports used by the protocols supported on XS/ SC26-2 Safety Controllers.
Use this information to help configure network firewalls to support only the required communications paths for any particular installation.
Lower-Level Protocols
Ethernet communication is typically described using four layers, each with its own set of protocols. At the top of that hierarchy is the Application layer. Below the Application layer are the Transport, Internet, and Link layers.
Information on the supported protocols from these three lower layers is
summarized in the following tables
Table 4. Link Layer Protocols
Protocol | Ether Type |
---|---|
Address Resolution Protocol (ARP) | 0 × 0806 |
PROFINET | 0 × 8892 |
Table 5. Internet Layer Protocols
Protocol | EtherType | IP Protocol # |
---|---|---|
Internet Protocol Version 4 (IPv4) | 0 × 0800 | (n/a) |
Internet Control Message Protocol (ICMP) | 0 × 0800 | 1 |
Internet Group Management Protocol (IGMP) | 0 × 0800 | 2 |
Table 6. Transport Layer Protocols
Protocol | EtherType | IP Protocol # |
---|---|---|
Transmission Control Protocol (TCP) | 0 × 0800 | 6 |
User Datagram Protocol (UDP) | 0 × 0800 | 17 |
Each of these lower-level protocols is required by one or more of the Application protocols supported on XS/ SC26-2 Safety Controllers.
Application Layer Protocols
The following table lists the TCP and UDP port numbers for the Application
layer protocols supported by XS/SC26-2 Safety Controllers.
Table 7. Application Layer Protocols
Protocol | TCP Port | UDP Port | XS/SC26-2 |
---|---|---|---|
Modbus TCP | 502 | x | |
PROFINET | 3496449152 | x | |
ETHERNET/IP | 44818 | 222244818 | x |
XS/SC26-2 Application Protocol | 63753 | x | |
XS/SC26-2 Discovery Protocol | 63754 | x |
Security Capabilities
This section describes the capabilities and security features of the XS/SC26-2 Safety Controller. Use the capabilities and security features as part of a defense-in-depth strategy to secure your control system.
Capabilities by Product
This section provides a summary view of the supported security capabilities.
Table 8. Security Capabilities
Security Capabilities | XS/SC26-2 |
---|---|
Predefined set of Subjects and Access Rights | x |
Access Control List | x |
Access Control and Authorization
This section describes the Access Control capabilities supported by XS/SC26-2 Safety Controllers, which includes its Authorization capabilities.
The Access Control process can be divided into two phases:
- Definition – Specifying the access rights for each subject (referred to as Authorization)
- Enforcement – Approving or rejecting access request
Authorization Framework
Defining the access rights for each subject implies that the system must have some means to identify each subject. The most familiar way this is achieved is by assigning a unique User ID to each person who will access the system.
XS/SC26-2 Safety Controllers, however, do not provide such a facility – there is no support for creating additional User IDs. A User ID does not even have to be specified to authenticate. In this case, authorization is based on the functionality being used and the password that is provided for authentication. However, the authentication features supported on XS/ SC26-2 Safety Controllers implicitly define a fixed set of subjects, which are identified here.
The subjects defined and supported by XS/SC2 6-2 Safety Controllers server
protocol are indicated in the following table.
Table 9. Subjects Available on XS/SC26-2 Safety Controllers
| Functionality| Application Protocol| Subjects Available
---|---|---|---
USB| Configuration and Live Monitoring Requests| USB Application| Anonymous
User 1
User 2
User 3
Continued from page 11
| Functionality| Application Protocol| Subjects Available
---|---|---|---
Ethernet| Live Monitoring Requests| XS/SC26-2 Application Protocol| Anonymous
User 1
User 2
User 3
Configuration Requests| XS/SC26-2 Application Protocol| User 1
User 2
User 3
Specifying Access Rights
For each subject, XS/SC26-2 Safety Controllers provide predefined access
rights. In some cases, those access rights can be partially restricted, while
in other cases they either cannot be changed at all or can only be revoked by
disabling the associated server/protocol.
Table 11. Access Rights on XS/SC26-2 Safety Controllers
| Functionality| Application Protocol| Subjects Available
---|---|---|---
Ethernet| PROFINET Server| PROFINET| Anonymous
Modbus TCP Server| Modbus TCP| Anonymous
ETHERNET/IP Server| Ethernet/IP| Anonymous
Key:
A = Access control
R = Read
W = Write
D = Delete/clear
The User 1 has the ability to prohibit any subject from reading or writing the Application configuration and/or Network Configuration. Only User 1 can reset controller to Factory Defaults
Enforcement
The XS/SC26-2 Safety Controller enforces the access rights for the data and
services that it provides. The XS/
SC26-2 Safety Controller ensures that the Application and Network
Configuration can only be updated by a user with the access rights to write
the Application Configuration.
Physical Access: The XS/SC26-2 Safety Controller requires physical or network access to the controller to change the application configuration, application logic, and/or overrides/forces of application data. To secure the safety controller, restrict physical access to it by placing the controller in a secure physical environment, such as a locked cabinet.
Password/PIN Management
The XS/SC26-2 Safety Controller has a set of predefined subjects. The
passwords for each subject must be explicitly managed. The Banner Safety
Controller Software enforces unique passwords for each subject.
The XS/SC26-2 Safety Controller requires a PIN that is 4 numeric characters
for USB access.
For Ethernet access, XS/SC26-2 Safety Controller requires a password that is between 8 and 31 characters long. The password must contain a mix of the following:
- Upper case letters
- Lower case letters
- At least one number
- At least one special character
In addition, all passwords within a single safety controller must be unique for User 1, User 2, and User 3 .
All of these restrictions are enforced by the controller and the Banner Safety Controller Software when used over Ethernet.
Banner Safety strongly recommends the use of complex passwords wherever
passwords are used for authentication.
Table 12. Authentication Supported by the XS/SC26-2 Safety Controller
Functionality | Authenticated Subjects | How Passwords are assigned |
---|---|---|
Configuration Requests | User 1 |
User 2
User 3| User 1
controls these passwords.
For more detailed information on assigning these passwords, refer to the XS/SC26-2 User Manual (p/n 174868).
Communication Protocols
Some communications protocols provide features that help protect data while it is “in flight” – actively moving through a network.
The most common of these features include:
- Encryption – Protects the confidentiality of the data being transmitted.
- Message Authentication Codes – Ensures message authenticity and integrity by cryptographically detecting message tampering or forgery. This ensures the data originated from the expected source and was not altered since it was transmitted, regardless of whether or not it was malicious.
Currently, only the XS/SC26-2 Application Protocol provides both of these
features when used over Ethernet. Other communications protocols supported by
XS/SC26-2 Safety Controllers do not provide either of these features, as
detailed in the following tables. Therefore, compensating controls may be
required to meet an installation’s security requirements for protecting data
in-flight.
Table 13. Protocol-provided Security Capabilities on XS/SC26-2 Safety
Controllers
| Protocol| Data Encryption| Message Authentication Codes
---|---|---|---
USB| XS/SC26-2 Application Protocol| N| N
Ethernet| XS/SC26-2 Application Protocol| Y| Y
XS/SC26-2 Discovery Protocol| N| N
Table 14. Protocol-provided Security Capabilities on XS/SC26-2 Ethernet-
based Industrial Protocols
| Protocol| Data Encryption| Message Authentication Codes
---|---|---|---
Ethernet| PROFINET| N| N
Modbus TCP| N| N
Ether Net/IP| N| N
Logging and Auditing
The XS/SC26-2 Safety Controllers do not provide a dedicated security log embedded within the controller.
However, the XS/SC26-2 Safety Controller does log configuration update events in a small (10 entry) configuration log table. Each entry includes the time and date that the configuration was confirmed, using the date and time of the configuration change as maintained on the PC. Also included are the configuration name and the confirmation Cyclic Redundancy Check (CRC).
View this configuration log using the Banner Safety Controller Software. The log is read-only and cannot be reset or exported from the controller. Resetting the controller to factory defaults also generates an entry in the log table.
The XS/SC26-2 Safety Controller also has a fault log. Most of the events that are logged in the XS/SC26-2 Safety Controller fault log represent functional issues, such as hardware failures and unexpected firmware operations. While those are not specific to security, they may provide information that is useful during a security audit. Fault logs are not retained after the power is removed from the safety controller. View the fault log either through the Banner Safety Controller Software or on the onboard display
Configuration Hardening
To assist in reducing the potential attack surface, this section provides information that can be used to harden the configuration of the XS/SC26-2 products that are present in a particular installation.
Consider configuration Hardening in addition to enabling and using security features such as Authentication, Access Control, and Authorization.
Banner Safety recommends disabling all ports, services, and protocols that aren’t required for the intended application. Do this on each XS/SC26-2 product.
Safety Controller
Use the information in this section when hardening the configuration of a XS/SC26-2 Safety Controller. Consider these options when configuring any XS/SC26-2 Safety Controller that supports them.
These settings are specified within the hardware configuration that is downloaded to the XS/SC26-2Safety Controller.
USB Port, Onboard Interface, and Physical Access
To reduce the potential attack surface, limit the physical access to the USB Port and the onboard interface by limiting the physical access to the safety controller.
This can be done by placing the safety controller in a physically secure environment, such as a locked cabinet
Ethernet Interface
Use the information in this section when hardening the configuration of the XS/SC26-2 Safety Controller’s Ethernet Interface. Consider these settings when configuring any XS/SC26-2 Ethernet Interface.
If your deployment does not need to access devices that are not on the Process
Control Network, routing should be disabled by setting the Gateway IP Address
to all zeros:
Table 15. Disabling IP Routing
Service | Parameter Name | Value |
---|---|---|
IP Routing | Gateway IP Address | 0.0.0.0 |
These settings are specified within the hardware configuration that is downloaded to the XS/SC26-2 Safety Controller.
Ethernet interface can also be completely disabled using the Banner Safety Controller Software.
For more information on these parameters, refer to the XS/SC26-2Safety Controller User Manual (p/n 174868)
Network Architecture and Secure Deployment
This section provides security recommendations for deploying a XS/SC26-2 Safety Controller in the context of a larger network
Reference Architecture
The following figure illustrates a reference deployment of XS/SC26-2 Safety Controllers.
Figure 1. Reference Network Architecture
The Manufacturing Zone networks (which include the Manufacturing Operations, Supervisory Control, and Process Control networks) are segregated from other untrusted networks such as the enterprise network (also referred to as the business network, corporate network, or intranet) and the internet using Demilitarized Zone (DMZ) architecture. The Process Control networks have limited exposure to traffic from higher-level networks, including other networks in the Manufacturing Zone, as well as from other Process Control networks.
Remote Access and Demilitarized Zones (DMZ)
DMZ architecture uses two firewalls to isolate servers that are accessible from untrusted networks. The DMZ should be deployed so that only specific (restricted) communication is allowed between the business network and the DMZ, and between the control network and the DMZ. Ideally, the business network and the control network should not communicate directly with each other.
If direct communication to a control network is required from the business network or from the internet, carefully control, limit, and monitor all access. For example, require two-factor authentication for a user to obtain access to the control network using Virtual Private Networking (VPN) and even then, restrict the allowed protocols/ports to the minimum set required. Further, every access attempt (successful or not) and all blocked traffic should be recorded in a security log that is regularly audited.
Access to Process Control Networks
Ethernet traffic from the Supervisory Control network to the Process Control networks should be restricted to support only the functionality that is required.
However, if a particular protocol (such as Modbus TCP) does not need to be used between those regions, configure the firewall to block that protocol. In addition to blocking the firewall, if a controller does not have another reason it needs to use that protocol, configure the controller itself to disable support for the protocol.
NOTE: Network Address Translation (NAT) firewalls typically do not expose all of the devices on the “trusted” side of the firewall to devices on the “untrusted” side of the firewall. Further, NAT firewalls rely on mapping the IP address/port on the “trusted” side of the firewall to a different IP address/port on the “untrusted” side of the firewall. Since communication to the XS/SC26-2 Safety Controller will typically be initiated from a PC on the “untrusted” side of the Process Control network firewall, protecting a Process Control network using a NAT firewall may cause additional communication challenges. Before deploying NAT, carefully consider its impact on the required communications paths.
Other Considerations
Configuration Management
A strategy for applying security fixes, including configuration changes, should be included in a facility’s security plan. Applying these updates often requires that an affected XS/SC26-2 Safety Controller be temporarily taken out of service. Some installations require extensive qualification and/or commissioning before changes are deployed to the production environment. While this requirement is independent of security, ensuring the ability to promptly apply security fixes, while minimizing downtime, may drive the need for additional infrastructure to help with this qualification.
Real-time Communication
When designing the network architecture, it is important to understand what impact the network protection devices (such as firewalls) will have on the real-time characteristics of the communications traffic that must pass through them.
As a result, network architectures that require real-time communications to pass through such devices may limit the applications that can be successfully deployed.
Additional Guidance
Protocol-specific Guidance
Protocol standards bodies may publish guidance on how to securely deploy
and use their protocols. Such documentation, when available, should be
considered in addition to this document
Government Agencies and Standards Organizations
Government agencies and international standards organizations may provide
guidance on creating and maintaining a robust security program, including how
to securely deploy and use Control Systems.
For example, the U.S. Department of Homeland Security has published guidance on Secure Architecture Design and on Recommended Practices for cyber-security with Control Systems. Such documentation, when appropriate, should be considered in addition to this document. Similarly, the International Society of Automation publishes the ISA-99 specifications to provide guidance on establishing and operating a cyber-security program, including recommended technologies for industrial automation and control systems
Contact Us
Banner Engineering Corp. headquarters is located at: 9714 Tenth Avenue North | Minneapolis, MN 55441, USA | Phone: + 1 888 373 6767
For worldwide locations and local representatives, visit www.bannerengineering.com.
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>